Results 51 to 60 of about 212,014 (305)

The anti‐CRISPR protein AcrIE8.1 inhibits the type I‐E CRISPR‐Cas system by directly binding to the Cascade subunit Cas11

open access: yesFEBS Letters, EarlyView.
In this study, we present the structure of AcrIE8.1, a previously uncharacterized anti‐CRISPR protein that inhibits the type I‐E CRISPR‐Cas system. Through a combination of structural and biochemical analyses, we demonstrate that AcrIE8.1 directly binds to the Cas11 subunit of the Cascade complex to inhibit the CRISPR‐Cas system.
Young Woo Kang, Hyun Ho Park
wiley   +1 more source

Intrusion Detection Based on Adaptive Sample Distribution Dual-Experience Replay Reinforcement Learning

open access: yesMathematics
In order to cope with ever-evolving and increasing cyber threats, intrusion detection systems have become a crucial component of cyber security. Compared with signature-based intrusion detection methods, anomaly-based methods typically employ machine ...
Haonan Tan   +3 more
doaj   +1 more source

High-speed railway perimeter intrusion detection approach based on Internet of Things

open access: yesAdvances in Mechanical Engineering, 2019
Efficient perimeter intrusion detection approach is vital to safety management of China high-speed railway. In this article, for high-speed railway perimeter intrusion detection problem, a perimeter intrusion detection framework based on Internet of ...
Zhengyu Xie, Yong Qin
doaj   +1 more source

Efficient classification using parallel and scalable compressed model and Its application on intrusion detection

open access: yes, 2014
In order to achieve high efficiency of classification in intrusion detection, a compressed model is proposed in this paper which combines horizontal compression with vertical compression.
Chen, Tieming   +3 more
core   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Application of data mining technology in detecting network intrusion and security maintenance

open access: yesJournal of Intelligent Systems, 2021
In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect.
Zhu Yongkuan   +4 more
doaj   +1 more source

A consensus based network intrusion detection system

open access: yes, 2015
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip   +2 more
core   +1 more source

Intrusion Detection System

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2020
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Shivani Agrawal   +4 more
openaire   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Efficient Computer Network Anomaly Detection by Changepoint Detection Methods

open access: yes, 2012
We consider the problem of efficient on-line anomaly detection in computer network traffic. The problem is approached statistically, as that of sequential (quickest) changepoint detection.
Polunchenko, Aleksey S.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy